Hi [[ session.user.profile.firstName ]]

The Rise of Surveillance Mobile Malware

With the increase in mobile and smart devices, we've expanded the threat landscape not only against threats to steal information, but for threats that have real physical risks. For instance, recent research by Google Project Zero and Volexity showed sophisticated attacks against both Android and iPhone devices that were targeted at Uighur Muslims and Tibet. Victims of this malware are targeted for persecution by the government of the People's Republics of China.

This talk will cover not only these attacks in specific, but in how threats are emerging that use new technologies which are being used to create physical threats to its victims and what that means for enterprises, SMBs, and society at large.


- Technical discussion on mobile surveillance techniques and malware.
- Cover real-world instances where such cyber attacks have led to physical harms.
- Discuss practical techniques to begin to mitigate such threats.
Recorded Nov 11 2019 42 mins
Your place is confirmed,
we'll send you email reminders
Presented by
John Bambenek, VP Security Research and Intelligence at ThreatSTOP, Inc.
Presentation preview: The Rise of Surveillance Mobile Malware

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Creating Data Leadership through Cybersecurity choices Mar 12 2020 1:00 pm UTC 60 mins
    Dr. Alea Fairchild, Ecosysm360 and The Constantia Institute
    Cybersecurity monitoring is designed to complement, mirror and support your business operations. To create a data leadership position and innovation for your customers, the appropriate cybersecurity policies and solutions need to be in place that fit your specific business model. You need to be thoughtful about assembling a cybersecurity team configured to serve your specific company needs.

    We will discuss how companies are designing their data leadership strategies based on cybersecurity requirements, looking at their internal staffing, technology sourcing and selection of 3rd party providers. Infrastructure expert, Dr. Alea Fairchild will be sharing industry trends based on Ecosystm research findings on cybersecurity solution selection.

    Join this webinar to hear Alea, joined by a guest speaker from IBM Security, discuss how to profile your company’s cybersecurity requirements to seek out the best advisors, skill sets and MSSP solution providers to work with your own business model in a cyber secure manner.

    They will explore how organizations can develop a fit for purpose cybersecurity strategy that grows with them in resilience while meeting the challenge of maturing security programs to scale with their business.

    Key Takeaways:

    1. Guidelines to grow a data leadership strategy in a non-highly regulated business.
    2. Five essential questions to ask as you screen potential cybersecurity solution providers.
    3. Why cyber resiliency is a more logical goal than being cyber secure.

    Dr. Alea Fairchild, Principle Advisor, Infrastructure & Cloud Enablement at Ecosystm360 and Director at The Constantia Institute sprl
  • Cyber Risk Management - How Effective is Your Program? Mar 12 2020 9:00 am UTC 60 mins
    Kojo Degraft Donkor CISSP, Cisco Systems – CX Americas
    Black hat actors continue to escalate the attack surfaces brought on by opportunities in emerging and matured technologies in Cloud, Internet of Things, Machine Learning, Artificial Intelligence. Several frameworks exist for managing Cyber Risks.

    This presentation will answer these questions:

    - How does your organization frame responses to these threats?
    - What approach works best for your organization?
    - What key elements make up an effective Cyber Risk Program?
    - Which of these elements should be top priority?
    - How dynamic is your Cyber Risk Management approach?
  • An ever-expanding IoT attack surface and what to do about it Mar 11 2020 5:00 pm UTC 60 mins
    Misha Nossik, Co-founder and CEO, Haystack Magic
    Common understanding of Internet of Things (IoT) includes smart devices, such as mobile phones, smart appliances, CPE networking devices and industrial sensors. However, the time is coming when dumb devices, such as tools, lab supplies, assembly parts, household items will join the IoT. If you are worried about IoT security now, imagine the scale and the magnitude of implications when the entire physical world gets included into the attack surface.

    In this presentation we will describe a practical use-case, illustrate the limitations of current methods and discuss the ways to address them.

    About the speaker:

    Misha Nossik is a serial entrepreneur and technology executive with over 25 years of experience in new product development for the Cloud, Cybersecurity and IoT sectors. He is a co-founder and CEO of Haystack Magic, an IoT SaaS for enterprise physical asset tracking.

    Previously, he was a co-founder, CTO and VP R&D of CloudLink, a cybersecurity startup acquired by EMC in 2015. Before that he was a founder and CEO of Thintropy, an early VDI vendor, which was acquired by SIMtone (f.k.a. XDS). He co-founded Solidum Systems, a network processor pioneer, acquired by IDT Inc. In 2001 he co-founded and chaired the Network Processing Forum. Misha has earned his MSc in Applied Mathematics at MIIT in Moscow. Misha is an avid skier and an active instrument-rated pilot.
  • Email Security and Cyber Resilience Strategy Mar 11 2020 3:00 pm UTC 60 mins
    Panelists to be announced
    The email threat landscape is constantly evolving. How are organizations staying up to date on all the email-based cyber threats?

    Join this panel of security experts and industry leaders as they discuss the latest trends in email security and how to prevent becoming the next news headline. Learn how to protect your organization from spam, malware, and phishing attacks.

    - Emerging trends in email attacks
    - Why email security is a key CISO priority in 2020
    - The human element of security
    - Solutions and best practices for protecting your organization
  • Cloud compliance in different countries, regions, languages — what is needed? Mar 10 2020 5:00 pm UTC 60 mins
    Juan Carlos Carrillo, Director, PwC
    Cloud compliance could be difficult if you are a multinational or in some cases if you have clients in different states, how can you address all the compliance requirements without losing your time redoing work, in this webinar we will describe the basic points you need to develop in order to be ready to comply with different regulations, audits or annual reviews.

    About the speaker:

    Juan Carlos Carrillo is a Security & Privacy professional with IT Management experience of more than 20 years in high tech industry. He has large expertise doing business with technology solutions to financial companies. Throughout Juan Carlos' career, he has developed extensive knowledge with software, hardware, consulting and professional services.

    Juan Carlos has a Masters in Finance graduated from ITESM in Mexico, a B.S. in Computer Systems Engineer from UVM in Mexico, He is certified as an Information Privacy Professional (CIPT), Certified as an Identity and Access Administrator (CIAM) and Certified in Cloud Security (CCSK).
  • CCPA Compliance Beyond Deadline Day Mar 10 2020 3:00 pm UTC 60 mins
    Guy Cohen | Lisa Hawke | Joanne Furtsch | Laura Koulet
    The California Consumer Privacy Act (CCPA) went into effect on January 1st 2020, yet there is still confusion and uncertainty regarding this data regulation, especially for businesses operating in a post-GDPR world.

    Are you familiar with the CCPA's privacy requirements? Is your organization ready for the most far-reaching data privacy regulation in the U.S. to date? 

    Join this panel of privacy experts for an interactive Q&A session to learn more about how CCPA will impact your organization, as well as dive into the main differences between CCPA and GDPR.
    - The CCPA privacy requirements- CCPA checklist beyond deadline day
    - Data mapping: how and why it is important for CCPA and GDPR
    - Data Subject Access Requests 
    - Other key similarities and differences between GDPR vs. CCPA
    - The future of privacy and compliance in 2020 and beyond

    - Guy Cohen, Strategy and Policy Lead, Privitar
    - Lisa Hawke, VP Security and Compliance, Everlaw
    - Joanne Furtsch, Director, Deputy Data Governance Officer, TrustArc
    - Laura Koulet, Vice President, Head of Legal & Privacy, Tapad
  • Assurance in the Cloud Mar 10 2020 11:00 am UTC 60 mins
    Krishna Iyer, Director, PwC UK | Tom Greer, Partner, PwC US
    Cloud technology is revolutionising the way we work and communicate.This rapid advancement in technology has created sophisticated cyber threats. As the Cloud technology matures, so have the user expectations – there is an increased demand for trust and transparency.

    This session will look at how the technology revolution has led to increased regulation and how cloud service providers can use this opportunity to turn compliance into a competitive advantage.

    About the speakers:

    Tom Greer, Partner, PwC US - Tom is the Technology, Media and Telecommunications (TMT) Sector Leader within PwC’s US Risk Assurance practice. He delivers trust and transparency services to cloud service providers and other technology organizations. Tom is a Certified Public Accountant and Certified Information Systems Auditor, and is based in New York City.

    Krishna Iyer, Director, PwC UK - Krishna is a Director in the UK Assurance Practice, focussing on emerging technology assurance. Krishna is an active blogger and has written various thought leadership on cloud security and compliance in the cloud, including a paper on ‘the role of Internal audit in auditing cloud’ for the ICAEW.
  • 2020 Security Technology for the Multi-Cloud Mar 9 2020 3:00 pm UTC 60 mins
    Chris Romano, Mandiant | more panelists to be announced
    Multi-cloud adoption is on the rise, but the challenge of securing organizations against cyber attacks remains.

    Discover the cost of data breaches in 2020, as well as the technologies CISOs are using for keeping track of their assets, assessing and managing cyber risk and mitigating threats against the enterprise.

    Join this Q&A panel of experts as they discuss:
    - CISO priorities in a multi-cloud environment
    - Biggest threats to the enterprise
    - How to assess and mitigate cyber risk
    - Technologies powering security
    - Best practices and recommendations for a more secure organization
  • Securing Multicloud Environments Mar 9 2020 1:00 pm UTC 60 mins
    Neil Briscoe, Co-founder and CTO, Cloud Gateway
    Many enterprises are leveraging multicloud deployments to get the best-of-breed features from many different providers. Hybrid cloud and multicloud have brought capability to businesses to be able to cover all aspects of their IT needs. However, they have also brought complexity in security requirements.

    Usually, IT and security professionals mitigate any security concerns by creating a trust boundary between:

    - The cloud and the user accessing via the internet

    - The cloud and users accessing the enterprise network in hybrid architectures

    - What is being missed is inter-cloud security considerations, potential threats, disparate support teams and governance.

    In this webinar, Neil Briscoe will share real-life examples, highlighting potential issues and offering solutions for you to ensure your hybrid cloud and multicloud environments are fully secured.

    About the speaker:

    Neil Briscoe, co-founder and CTO at Cloud Gateway, has 20 years’ experience in IT, working across multiple sectors for leading companies including PepsiCo, Asda, Capita, Aviva and the Ministry of Justice where he was responsible for leading architecture and delivery.

    Neil focuses primarily on open source technologies, infrastructure automation, network architecture and design. As CTO at Cloud Gateway, he continues to drive product development through technical direction for existing, new and future problem spaces whilst leading innovation in the hybrid connectivity space, with the aim of enabling organisations of all sizes to harness the power and flexibility of hybrid cloud. His innovative approach to secure, hybrid networks has seen him earn the highest of industry recognised accolades.

    Neil is also a Cisco Certified Network Expert (CCIE), widely recognised as the hardest/highest network certification available in the market.
  • 2020 Election – Hacking The Vote Feb 24 2020 5:00 pm UTC 60 mins
    David Morris | Cameron Koffman | Tinatin Japaridze | Lance James
    The inaugural episode of the Election Hacking series will introduce the topic of who, how and why the upcoming 2020 election will be hacked.

    Join this interactive Q&A session to learn more about election hacking, its impact, the various stakeholders, and what if anything, can be done.

    Our unique panel of individuals will bring diverse perspectives to this topic.

    - Cameron Koffman, who, if elected, would be the youngest candidate since Theodore Roosevelt running for the NY State Assembly
    - Tinatin Japaridze, former United Nations correspondent for the Russian and Ukrainian media, with expertise in bi-lateral US-Russian relations on cyber security.
    - Lance James, CEO of Unit 221B and noted cyber security expert who has assisted various law enforcement and government agencies on some of the most highly publicized hacking investigations.

    Moderator: David Morris, Executive Director at Digital Risk Management Institute
  • Good vs Bad Metrics Feb 18 2020 8:00 pm UTC 60 mins
    Rhonda Bricco (UnitedHealth Group), Deb Doffing (Optum), Sue Perkins (Optum), Cat Goodfellow (Optum)
    Security leaders are increasingly basing their decisions on metrics to justify spending, quantifying risk, and demonstrating value to the executive suite. This panel of leaders will discuss how they are awash in dashboards, charts, and KPIs of little to no value and what they’ve done to develop contextual, impactful, actionable metrics.
  • Social Engineering Threats to Enterprise Security Feb 18 2020 5:00 pm UTC 60 mins
    Diana Kelley | Tyler Cohen Wood | Stephanie Carruthers | Samantha Davison
    Join us as we review social engineering tactics and attack methods. Learn about the latest trends in social engineering, the risk to your organization's cybersecurity and what steps to take to mitigate it.

    Viewers will learn more about:
    - How social engineers exploit human behavior
    - Most common types of social engineering attacks
    - New in phishing, baiting, tailgating and more
    - Managing access and insider threats

    This episode is part of The (Security) Balancing Act series with Diana Kelley. Viewers are encouraged to ask questions during the live Q&A.
  • Threat Landscape 2020 – Expect the Unexpected Recorded: Feb 13 2020 61 mins
    Alex Holden, CISO Hold Security, LLC
    Security threats mutate and lately they are becoming more bold than ever. What is driving this pattern? We will examine new patterns in ransomware, phishing, and data exposures that are greatly affecting our security posture as well as provide better guidelines for mitigating these threats.
  • Biggest Cyber Threat: 3.5 M Unfilled Cyber Jobs Recorded: Feb 13 2020 45 mins
    Dr. V. N. Berlin, CAO,Mission Critical Institute & Mr. Rob Chubbuck, Sr, Cyber Systems. Engineer, CACI Intl.
    The biggest cyber threat is 3.5M unfilled cyber jobs. Without job-ready cyber talent employers cannot prevent or recover effectively from cyber breaches and compliance gaps. Without cyber talent, employers cannot benefit from their cyber technology investments. Learn tested strategies for mitigating the growing cyber talent gap with job-ready, certified cyber practitioners.

    Qualify for a full or partial scholarship. https://missioncriticalinstitute.org/cissp-exam-prep-bootcamp/

    -Claim your $1000 CISSP Coupon Code
    -Learn about 100% CISSP Exam Guarantee
  • [Earn CPE] Automating GRC to Increase Business Value Recorded: Feb 13 2020 76 mins
    Matt Kunkel, LogicGate; James Rice, Greenlight Technologies; Scott Bridgen, OneTrust; and Allan Liska, Recorded Future.
    GRC is neither a project nor a technology, but a corporate objective for improving governance through more-effective compliance and a better understanding of the impact of risk on business performance. GRC can vary dramatically depending on the businesses vertical market, and even further complexity can be found from one business unit to another. This complexity drives the need for different, highly specialized tools, which raises a huge set of cost, integration, and management issues.

    To address this challenge, many businesses are opting for an automated GRC (eGRC) solution, which aims to resolve the challenges associated with scattered and disconnected operational security processes through the centralization of data, alignment of processes and workflows, and clear enterprise-level visibility with trend and analysis metrics and reporting. The benefits of Automating GRC are substantial when businesses have a mature GRC program in place. Attend this expert CPE webinar to gain insights on:

    - Understanding the GRC Business Drivers.
    - Defining Your GRC Strategy.
    - Developing a GRC Roadmap that is aligned with the Mission, Value, and Strategic Agenda of Your Business.
    - Getting Leadership Support and Enabling Cross-Departmental Collaboration.
  • New Threats on the Block - What does the cyber future look like? Recorded: Feb 13 2020 55 mins
    Joseph Carson, Chief Security Scientist, Thycotic
    Cyber security is a hot topic as the world has witnessed a rapid increase in cyber-attacks, data breaches, data leaks and espionage. Governments are taking cyber security seriously, increasing investment in both defensive and offensive capabilities, and introducing regulations to support legal frameworks.

    Unfortunately, cyber-attackers don't sleep or take vacations and this means you must be prepared and ready at any time during the day or night.

    Join this webinar to learn about the following:
    - Which cyberattack is most likely the one that will hit you?
    - What are the top threats in 2020?
    - What are the latest threats?
  • [PANEL] Protecting the Enterprise from Threats in 2020 Recorded: Feb 13 2020 61 mins
    Jo Peterson, Tyler Cohen Wood, Carlos Valderrama, Athar Awan & Etay Maor
    2019 was the worst year to date for data breaches. Phishing, misconfiguration mistakes, third party risk, and insider threats continue to plague organizations across industry verticals. So, what are some proactive approaches organizations can take to address old and new security threats in 2020?

    Join this panel of security experts and industry leaders to learn more about:
    - The biggest threats to the enterprise in 2020
    - What keeps CISOs up at night
    - How to stay ahead of the threats
    - Proactive security strategies and best practices
    - Avoiding misconfiguration mistakes and minimizing the risk of insider threats
    - Solutions available today and what to expect in the near future

    Jo Peterson, Vice President Cloud Services, Clarify360 (Moderator)
    Tyler Cohen Wood, Cyber Security Expert, Former Senior Intelligence Officer, Private Consultant
    Carlos Valderrama, SOC Director, Proficio
    Athar Awan, Cyber Security Consultant, Security Solutions Consultants
    Etay Maor , Chief Security Officer, InSights
  • Software Defined Segmentation at the Edge Recorded: Feb 12 2020 37 mins
    Predrag "Pez" Zivic, Security Solutions Architect, Pensando Systems
    A lot of organizations are trying to implement some kind of segmentation in their data centers. Different approaches to segmentation deployment have exposed many challenges. During this talk approach to segmentation at the edge will be considered. When implementing segmentation at the edge disruption to existing infrastructure is minimal and performance of the network is improved. Attendees will learn about this new software defined segmentation at the edge approach benefits.
  • A Game of Risk: Third Party Threat Landscape Recorded: Feb 12 2020 38 mins
    Elizabeth Wharton, Chief of Staff, SCYTHE
    Third parties continue to be a rising cause for costly breaches. Approach mitigating these costs through basic board game strategies: identify an organization's third party landscape, observe threat movements, and strengthen internal resources.
  • Unifying Data: A Simpler Approach to Cybersecurity Recorded: Feb 12 2020 50 mins
    Jon Abbott, CEO, ThreatAware
    The cybersecurity industry is flooded with tools that protect different aspects of your network, your supply chain, your critical data.
    In this webinar, ThreatAware CEO Jon Abbott will examine how to identify the most effective tools for your organisation, available on the market today. Furthermore, he’ll explore how consolidating the information they provide makes their power even greater.

    Key takeaways
    - How to identify the tools that will best suit your organisation’s cybersecurity needs
    - How cybersecurity tools can complement each other to produce better quality information
    - How to effectively use data collated in a single pane to best protect your organisation
The latest trends and best practice advice from the leading experts
This channel features presentations by leading experts in the field of information security. From application, computer, network and Internet security to access control management, data privacy and other hot topics, you will walk away with practical advice for your strategic and tactical information security initiatives.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: The Rise of Surveillance Mobile Malware
  • Live at: Nov 11 2019 6:00 pm
  • Presented by: John Bambenek, VP Security Research and Intelligence at ThreatSTOP, Inc.
  • From:
Your email has been sent.
or close